We can't find the internet
Attempting to reconnect
Something went wrong!
Hang in there while we get back on track
DirectX: The New Hyper-V Attack Surface
Discover the shocking new attack surface in DirectX, including vulnerabilities in DSGK-VMB, vid-shi-signal-sync-object and DSG_KERNEL_Linux_KERNEL, and how they can be exploited using DxG kernel IOCTLs.
-
The DSGK-VMB command is vulnerable to attacks due to the lack of proper initialization of variables in the
cvn32k_logs
structure. -
The
vid-shi-signal-sync-object
function is vulnerable to non-pointer reference vulnerabilities, allowing an attacker to control the ISRs and access arbitrary memory locations. -
The
DSG_HOST_VIRTUAL_GPU_VMBOS_VMBOS_COMMAND_TABLE_VGPU2_HOST_TABLE
table contains a large number of commands that can be used to exploit the vulnerability. -
The
DSG_KERNEL_Linux_KERNEL
module is vulnerable to arbitrary address read vulnerabilities due to the lack of proper bounds checking. -
The
DxG kernel
through a set of IOCTLs, provides a way to interact with theDSG kernel
and exploit the vulnerability. -
The
Hyper-V direct as component
architecture provides a new attack surface that can be exploited by an attacker.